Derui Wang
Orcid: 0000-0003-1388-7715
According to our database1,
Derui Wang
authored at least 29 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Dependable Secur. Comput., 2024
Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition Systems.
CoRR, 2024
Proceedings of the IEEE Security and Privacy, 2024
Towards Evaluating the Robustness of Automatic Speech Recognition Systems via Audio Style Transfer.
Proceedings of the 2nd ACM Workshop on Secure and Trustworthy Deep Learning Systems, 2024
Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis, 2024
Effects of Exponential Gaussian Distribution on (Double Sampling) Randomized Smoothing.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Optimizing Cyber Defense in Dynamic Active Directories Through Reinforcement Learning.
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
CoRR, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
2022
ACM Trans. Internet Techn., 2022
Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Daedalus: Breaking Nonmaximum Suppression in Object Detection via Adversarial Examples.
IEEE Trans. Cybern., 2022
Found. Trends Technol. Inf. Oper. Manag., 2022
2021
Man-in-the-Middle Attacks Against Machine Learning Classifiers Via Malicious Generative Models.
IEEE Trans. Dependable Secur. Comput., 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
2019
Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples.
CoRR, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2015
Explore the hidden treasure in protein-protein interaction networks - An iterative model for predicting protein functions.
J. Bioinform. Comput. Biol., 2015